Report: North Korea May Be Behind Sony Pictures Hack After All

Despite the FBI saying just a few days ago that there was "no attribution to North Korea at this point", ABC News is reporting that federal cyber-security sources "close to the investigation" have indeed confirmed that the FBI does have reason to believe that North Korea may be involved in some capacity after all.

Specifically, the sources are citing evidence suggesting that the initial breach "was routed through a number of infected computers in various locations overseas, including computers in Singapore, Thailand, Italy, Bolivia, Poland and Cyprus." All of which may have been perpetrated by an elite North Korean hacking unit known as Bureau 21.

Potentially adding credence to this theory, and according to ABC News' sources, a malicious app that infected South Korean smartphones last year used language markedly similar to that used by the GOP in its various data leaks.

Of course, until we get an official statement from the feds, nothing can really be said for certain. And many are still doubtful or North Korea's involvement, citing the act that, as far as we know, North Korea probably doesn't have the skill necessary to carry out such a sophisticated attack. As David Kennedy, founder of security consulting firm TrustedSec, told Business Insider:

North Korea is definitely stepping up its offensive capability. But it is still very shut off and secretive, so it struggles with getting the technology it needs to launch major cyberattacks.

Trending Stories Right Now

There’s no shortage of data breaches these days, but this one should make you sit up and pay attention. The newly discovered “Collection #1" is the largest public data breach by volume, with 772,904,991 unique emails and 21,222,975 unique passwords exposed.

Apple and Google compete in a whole host of areas, from mobile operating systems to music platforms, so it follows that they have competing streaming media protocols as well—something that we’ve been hearing plenty about at CES 2019. But how exactly do these technologies work? And how do they stack up against each other?